Threat hunting: The proactive search for signs of malicious activity within a system or network that haven’t been detected by traditional security solutions. It involves using analytics and threat intelligence to identify abnormalities or indicators of compromise, helping to uncover stealthy, advanced threats that may have bypassed initial security defenses.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D2: Threats Vulnerabilities and Mitigations | SSCP D7: Systems and Application Security
« Back to Glossary Index